A. Identify the Internet Protocol of the target system.B. Determine if the network is up or down.C. Identify which ports and services are open on the target host.D. Identify legitimate users of a system.